Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 05:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-09_6f34ff0c570eedc111e44e13e283e44a_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-09_6f34ff0c570eedc111e44e13e283e44a_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-09_6f34ff0c570eedc111e44e13e283e44a_cryptolocker.exe
-
Size
77KB
-
MD5
6f34ff0c570eedc111e44e13e283e44a
-
SHA1
c960b0d100fc9629a579ba203d3a22d73e5efdea
-
SHA256
a634c5c7df4d9315447560e702805a9660448987eabae1b0935777d3fa656342
-
SHA512
b869a03cc651aef3ef07fd716eafa75e3020c8bfcfab43ff3402caf8e3a7446775893974112d5916304eb432a8e4187c78cdba0f5cdaf822645c7024ff0c5c4e
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfIuf1:vCjsIOtEvwDpj5H9YvQd2x
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012252-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012252-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2516 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1888 2024-03-09_6f34ff0c570eedc111e44e13e283e44a_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2516 1888 2024-03-09_6f34ff0c570eedc111e44e13e283e44a_cryptolocker.exe 28 PID 1888 wrote to memory of 2516 1888 2024-03-09_6f34ff0c570eedc111e44e13e283e44a_cryptolocker.exe 28 PID 1888 wrote to memory of 2516 1888 2024-03-09_6f34ff0c570eedc111e44e13e283e44a_cryptolocker.exe 28 PID 1888 wrote to memory of 2516 1888 2024-03-09_6f34ff0c570eedc111e44e13e283e44a_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-09_6f34ff0c570eedc111e44e13e283e44a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-09_6f34ff0c570eedc111e44e13e283e44a_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD5dbf33dfda1fbfaf71b3711303034f6a0
SHA1857d65aa656a8f8f579519df0a59f4e8000a3114
SHA256f4884969a258f6c1517123db479d61e971df27a07ea7f4c491e9376094a3e236
SHA512b099933cbb546fb5165fbbfa112242c5651dbe781f9eeb40be88c398be31405a394ef079ebfd5b6d462f6bf49ebaaf0d29c7eaf7e4aeeda480dc6bb8caf21e2c